| Patch protect |
Not sure if i solved it in a way it was not intended to be solved - but the protection did not detect my patch. I looked for string refrences in x64dbg then where it says try again i just changed the bytes to load address of great job welcome and then jump to there |
2025-10-31 16:27 |
| C++ and assembly login crackme (no virtualization and no anti debugging) |
thanks for the crackme! It was very easy, you can find it by searching for string refrences in x64dbg |
2025-10-31 15:31 |
| Very easy disassembly execise |
nice easy crackme, good one to try when using ghidra for the first time |
2025-10-31 15:11 |